Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 16:11
Behavioral task
behavioral1
Sample
Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe
Resource
win7-20240903-en
General
-
Target
Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe
-
Size
3.1MB
-
MD5
6d548f65275db48621c739026edba1d6
-
SHA1
7e8f3e64920984e407cfa5d257e67bfb885c67d8
-
SHA256
445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
-
SHA512
c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a
-
SSDEEP
49152:rvOI22SsaNYfdPBldt698dBcjHxuRJ6PbR3LoGdsnTHHB72eh2NT:rvj22SsaNYfdPBldt6+dBcjHxuRJ6h
Malware Config
Extracted
quasar
1.4.1
Office04
5.252.74.51:1337
c9ab7a3b-f343-40bc-bf8b-f072c9beccf5
-
encryption_key
22D8B6518A5AB3703F6FD0075F58F8B4DB404298
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3780-1-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral2/files/0x000900000001e59a-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 492 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3780 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe Token: SeDebugPrivilege 492 Client.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 492 Client.exe 492 Client.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 492 Client.exe 492 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3780 wrote to memory of 492 3780 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe 86 PID 3780 wrote to memory of 492 3780 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe"C:\Users\Admin\AppData\Local\Temp\Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56d548f65275db48621c739026edba1d6
SHA17e8f3e64920984e407cfa5d257e67bfb885c67d8
SHA256445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
SHA512c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a